Introduction
Cyber attack is a significant danger to any business and government entity. Recent attacks on big corporates as well as private businesses highlight the extent of harm that hackers can cause. As we observe rising attacks on IT systems, operational technologies are no exceptions. In this blog, I have compiled a few top ICS Cyber attacks in India and across the globe that were truly lethal.
Oil India Limited Attack (2022)
In a very recent cyber incident Oil India Limited became the victim of a cyberattack, and the hackers held it hostage on 22nd April 2022. The scope of the damaged systems was not immediately apparent, although a spokesperson who confirmed the issue stated production and drilling systems were not affected. The attack has resulted in a ransom demand of more than INR 57 crore.
According to an official sp0kesperson of Oil India, there has not been any data loss, and the affected systems have been taken out the operational network without impacting any control functions. The spokesperson also mentioned that their IT staff are working to restore the affected systems.
Enterprise Secure Remote Access Feature Set
Going far beyond a typical IT VPN, an enterprise secure remote access solution should layer in security for IT network & systems in support of a defence-in-depth strategy. Most security professionals recognize that delaying attackers, complicating their attack path, or incurring upon them excessive costs are all barriers to mitigating risk of complete malicious outsider penetration and access to critical assets. Technology feature sets that should be part of an Industrial Grade Secure Remote Access solution are listed below:
ACCOMMODATING FOR SCALE
Another consideration for laying this foundational technology is the ability to scale and grow capabilities as operations evolve.
CONCLUSION
Managing Dynamic Risk Conditions
In recent years, cybersecurity attacks have increased against enterprises, and the nature of risks remains dynamic. Implementing a centralized, secure remote access solution lays the foundation for agility as needed for business continuity in compliance with cybersecurity best practices.
In addition, more recent concerns such as health pandemics may have longer-reaching consequences that are difficult to predict. Implementing a robust architecture that allows for flexible staffing and ongoing operations despite personnel disruptions can represent a wise investment.